Amazon Price: N/A (as of May 24, 2017 09:11 –
International human rights law offers an overarching international legal framework to help determine the legality of the use of any weapon, as well as its lawful supply. It governs acts of States and non-State actors alike. In doing so, human rights law embraces international humanitarian law regulation of the use of weapons in armed conflict and disarmament law, as well as international criminal justice standards. In situations of law enforcement (such as counterpiracy, prisons, ordinary policing, riot control, and many peace operations), human rights law is the primary legal frame of reference above domestic criminal law. This important and timely book draws on all aspects of international weapons law and proposes a new view on international law governing weapons. Also included is a specific discussion on armed drones and cyberattacks, two highly topical issues in international law and international relations.
Cyber terrorism is an emerging new mode of information warfare underscoring the perpetrators’ deliberate exploitation of civilian and military systems’ inherent vulnerabilities, thereby affecting national and global security. This volume includes contributions made by academics, policymakers, and professionals at seminars and conferences co-sponsored by the International Center for Terrorism Studies (Potomac Institute for Policy Studies), and the Terrorism Studies Center (The George Washington University), during the past several years. It also includes statements by key government officials and industry experts at different forums in the United States dealing with both threats and responses.
Included are the statements and assessments of James Adams, Edgar A. Adamson, Madeleine Albright, Mario Balakgie, Elizabeth Banker, Bill Clinton, Fred Cohen, James X. Dempsey, Dianne Feinstein, Kenneth Flamm, Louis J. Freeh, Gideon Frieder, Tom Fuhrman, Charles Giancarlo, Eric Holder, Feisal Keblawi, Jon Kyl, Neal Lane, Joseph Lieberman, Robert T. Marsh, Paul Misener, Roger Molander, Richard Pethia, Janet Reno, Howard Schmidt, Charles Schumer, Robert Shea, David L. Sobel, John Tritak, and Michael A. Vatis.
Click here to buy from Amazon
Amazon Price: $175.00 $143.00 You save: $32.00 (18%). (as of May 24, 2017 09:29 –
Targeting is the primary method for securing strategic objectives in an armed conflict. Failure to comply with the law of targeting jeopardizes the achievement of those aims. It is therefore essential that all those involved in or studying issues surrounding targeting have an accurate and complete understanding of this area of law. This book offers the definitive and comprehensive statement of all aspects of the law of targeting. It is a 'one-stop shop' that answers all relevant questions in depth. It has been written in an open, accessible yet comprehensive style, and addresses both matters of established law and issues of topical controversy.
The text explains the meanings of such terms as 'civilian', 'combatant', and 'military objective'. Chapters are devoted to the core targeting principles of distinction, discrimination, and proportionality, as well as to the relationship between targeting and the protection of the environment and of objects and persons entitled to special protection. New technologies are also covered, with chapters looking at attacks using unmanned platforms and a discussion of the issues arising from cyber warfare. The book also examines recent controversies and perceived ambiguities in the rules governing targeting, including the use of human shields, the level of care required in a bombing campaign, and the difficulties involved in determining whether someone is directly participating in hostilities. This book will be invaluable to all working in this contentious area of law.
Amazon Price: N/A (as of May 24, 2017 00:21 –
The rise of sophisticated cyber threats means that the task of managing cyber risks, once the near-exclusive realm of IT professionals, is now also borne by attorneys, senior executives, and directors. Cybersecurity: A Practical Guide to the Law of Cyber Risk provides the practical steps that can be taken to help your clients understand and mitigate today’s cyber risk and to build the most resilient response capabilities possible.
Cybersecurity: A Practical Guide to the Law of Cyber Risk provides a comprehensive discussion of the complex quilt of federal and state statutes, Executive Orders, regulations, contractual norms, and ambiguous tort duties that can apply to this crucial new area of the law. For example, it describes in detail:The leading regulatory role the Federal Trade Commission has played, acting on its authority to regulate unfair or deceptive trade practices;The guidance issued by the SEC interpreting existing disclosure rules to require registrants to disclose cybersecurity risks under certain circumstances;The varying roles of other regulators in sector-specific regulation, such as healthcare, energy, and transportation; andThe impact of preexisting statutes, such as the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act, on current cybersecurity issues.
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China’s famous Great Firewall of China is one of the first national Internet filtering systems. Today the new tools for Internet controls that are emerging go beyond mere denial of information. These new techniques, which aim to normalize (or even legalize) Internet control, include targeted viruses and the strategically timed deployment of distributed denial-of-service (DDoS) attacks, surveillance at key points of the Internet’s infrastructure, take-down notices, stringent terms of usage policies, and national information shaping strategies. Access Controlled reports on this new normative terrain.
The book, a project from the OpenNet Initiative (ONI), a collaboration of the Citizen Lab at the University of Toronto’s Munk Centre for International Studies, Harvard’s Berkman Center for Internet and Society, and the SecDev Group, offers six substantial chapters that analyze Internet control in both Western and Eastern Europe and a section of shorter regional reports and country profiles drawn from material gathered by the ONI around the world through a combination of technical interrogation and field research methods.
Chapter authors: Ronald Deibert, Colin Maclay, John Palfrey, Hal Roberts, Rafal Rohozinski, Nart Villeneuve, Ethan Zuckerman
Information Revolution and Global Politics series
Click here to buy from Amazon